64 research outputs found

    A novel algorithm for the adaptation of the pole of Laguerre filters

    No full text
    Published versio

    Synthesis of structurally diverse 3,4-dihydropyrimidin-2(1H)-ones via sequential Biginelli and Passerini reactions

    Get PDF
    The Biginelli reaction was combined with the Passerini reaction for the first time in a sequential multicomponent tandem reaction approach. After evaluation of all possible linker components and a suitable solvent system, highly functionalized dihydropyrimidone–α-acyloxycarboxamide compounds were obtained in good to excellent yields. In a first reaction step, different 3,4-dihydropyrimidin-2(1H)-one acids were synthesized, isolated and fully characterized. These products were subsequently used in a Passerini reaction utilizing a dichloromethane/dimethyl sulfoxide solvent mixture. By variation of the components in both multicomponent reactions, a large number of structurally diverse compounds could be synthesized. In addition, a one-pot Biginelli–Passerini tandem reaction was demonstrated. All products were carefully characterized via 1D and 2D NMR as well as IR and HRMS

    Achieving favourable customer outcomes through employee deviance

    Get PDF
    This study advances current knowledge by examining how employee deviance and customer participation during a single employee-customer exchange generate favourable customer responses. This work bridges the employee deviance stream with the service encounter literature and illustrates the importance of equity theory in deviant service exchanges between customers and employees. Moreover, results add to the ongoing debate on service nepotism by canvassing the consequences from the customer’s active participation in deviant exchanges which appears to enhance customer perceptions of the exchange. A 3x2 between-subjects experimental design was adopted which manipulates three types of pro-customer deviance along with customer’s participation (or not) to the exchange. The dependent variables capture three types of perceived customer justice (cognitive outcomes) and customer’s affective state (affective outcome). Findings illustrate that customers approve employees’ deviance for their own benefit while also indicate favourable outcomes from deviant exchanges with employees such as higher perceived justice and a more positive affective state. The article concludes with a discussion of the theoretical and managerial implications, limitations and research directions that emerge from this study

    Customer incivility as an identity threat for frontline employees: The mitigating role of organizational rewards

    Get PDF
    This work proposes identity theory as a novel theoretical lens for understanding frontline employees' responses to customer incivility in tourism and hospitality. We advance pertinent research by demonstrating that customer incivility constitutes a dual identity threat (individual/collective threat) for frontline employees. Two experimental studies reveal that: customer incivility towards frontline employees' individual identity affects their psychological responses more adversely than their citizenship behavior; non-monetary rewards are more effective at reducing the adverse effects of customer incivility on frontline employees' psychological responses (than monetary rewards); finally, allowing frontline employees to choose the reward they deem most appropriate enhances both their psychological responses and citizenship behavior. Based on these results a four-step process is proposed to help managers dealing with customer incivility

    Multicomponent reactions provide key molecules for secret communication

    Get PDF
    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message

    hnRNP A1 and hnRNP F Modulate the Alternative Splicing of Exon 11 of the Insulin Receptor Gene

    Get PDF
    Exon 11 of the insulin receptor gene (INSR) is alternatively spliced in a developmentally and tissue-specific manner. Linker scanning mutations in a 5′ GA-rich enhancer in intron 10 identified AGGGA sequences that are important for enhancer function. Using RNA-affinity purification and mass spectrometry, we identified hnRNP F and hnRNP A1 binding to these AGGGA sites and also to similar motifs at the 3′ end of the intron. The hnRNPs have opposite functional effects with hnRNP F promoting and hnRNP A1 inhibiting exon 11 inclusion, and deletion of the GA-rich elements eliminates both effects. We also observed specific binding of hnRNP A1 to the 5′ splice site of intron 11. The SR protein SRSF1 (SF2/ASF) co-purified on the GA-rich enhancer and, interestingly, also competes with hnRNP A1 for binding to the splice site. A point mutation -3U→C decreases hnRNP A1 binding, increases SRSF1 binding and renders the exon constitutive. Lastly, our data point to a functional interaction between hnRNP F and SRSF1 as a mutant that eliminates SRSF1 binding to exon 11, or a SRSF1 knockdown, which prevents the stimulatory effect of hnRNP F over expression

    Automated sleep breath disorders detection utilizing patient sound analysis

    No full text
    Results of clinical studies suggest that there is a relationship between breathing-related sleep disorders and behavioral disorder and health effects. Apnea is considered one of the major sleep disorders with great accession in population and significant impact on patient's health. Symptoms include disruption of oxygenation, snoring, choking sensations, apneic episodes, poor concentration, memory loss, and daytime somnolence. Diagnosis of apnea and breath disorders involves monitoring patient's biosignals and breath during sleep in specialized clinics requiring expensive equipment and technical personnel. This paper discusses the design and technical details of an integrated low-cost system capable for preliminary detection of sleep breath disorders at patient's home utilizing patient sound signals. The paper describes the proposed architecture and the corresponding HW and SW modules, along with a preliminary evaluation. (C) 2012 Elsevier Ltd. All rights reserved

    Give me an upgrade or I will give you a bad review!: Investigating customer threats in the hospitality industry

    No full text
    This work is a first attempt to explain the phenomenon of customer threats and identify the individual and situational factors that drive this phenomenon in tourism and hospitality. Towards this goal, one qualitative and two quantitative studies are employed. Study 1 conceptualizes customer threats by uncovering two of the most common forms of verbal threats (i.e., threat to switch and threat to negative word of mouth) and their distinctive features as well as customers’ motivations behind them, and some situational conditions that favor the enactment of customer threats. Using a survey-based approach, study 2 sheds light on three incident-specific drivers (i.e., psychological reactance, rumination, and justice perceptions) of the two main forms of customer threats. Finally, using an experimental approach, study 3 assesses the effectiveness of two service recovery strategies (self-service recovery vs. human-based recovery) at mitigating customer threats following service failure incidents
    • …
    corecore